Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27969: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in vitessio vitess

0
Critical
VulnerabilityCVE-2026-27969cvecve-2026-27969cwe-22
Published: Thu Feb 26 2026 (02/26/2026, 01:52:30 UTC)
Source: CVE Database V5
Vendor/Project: vitessio
Product: vitess

Description

Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that files in the manifest — which may be files that they have also added to the manifest and backup contents — are written to any accessible location on restore. This is a common path traversal security issue. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there. Versions 23.0.3 and 22.0.4 contain a patch. No known workarounds are available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 10:03:25 UTC

Technical Analysis

Vitess is a database clustering system designed to horizontally scale MySQL databases. The vulnerability CVE-2026-27969 is a path traversal flaw (CWE-22) found in Vitess versions before 22.0.4 and between 23.0.0 and 23.0.3. It occurs because the software does not properly restrict pathnames in backup manifest files during the restore process. An attacker who has read/write permissions on the backup storage location, such as an S3 bucket used to store backups, can craft or modify manifest files to include paths that traverse directories outside the intended backup restore directory. When Vitess processes these manifests during a restore operation, it writes files to arbitrary locations accessible by the process. This can lead to overwriting or creating files in critical system or application directories, potentially allowing the attacker to execute arbitrary commands or gain unauthorized access to the production environment. The vulnerability requires the attacker to have elevated privileges on the backup storage but does not require network access or user interaction. The issue is patched in Vitess versions 22.0.4 and 23.0.3. No known workarounds exist, making timely patching essential. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required on the target system but high privileges on backup storage, and user interaction is required. The impact on confidentiality, integrity, and availability is high, with a critical severity rating of 9.3.

Potential Impact

The vulnerability allows attackers with access to backup storage to write arbitrary files anywhere accessible by the Vitess restore process, potentially leading to full compromise of the production environment. This can result in unauthorized data disclosure, data tampering, and execution of arbitrary commands, severely impacting confidentiality, integrity, and availability of critical database infrastructure. Organizations relying on Vitess for MySQL scaling and using cloud storage for backups are at risk of supply chain-type attacks where backup files are manipulated. This could disrupt business operations, lead to data breaches, and cause significant financial and reputational damage. The lack of workarounds increases the urgency for patching. Given Vitess’s use in large-scale deployments, the scope of affected systems can be broad, especially in cloud-native and containerized environments.

Mitigation Recommendations

1. Immediately upgrade Vitess to versions 22.0.4 or 23.0.3 or later to apply the official patch. 2. Restrict and monitor access to backup storage locations, ensuring only trusted personnel and systems have read/write permissions. 3. Implement strict IAM policies and use encryption and access logging on backup storage services like S3 to detect unauthorized modifications. 4. Validate and audit backup manifest files before restore operations to detect unexpected or suspicious path entries. 5. Use network segmentation and least privilege principles to limit the ability of attackers to reach backup storage. 6. Employ runtime security monitoring on Vitess hosts to detect anomalous file writes or execution of unexpected commands during restore. 7. Consider implementing integrity verification mechanisms (e.g., cryptographic hashes) for backup manifests and contents to prevent tampering. 8. Regularly review and update incident response plans to include scenarios involving backup manipulation and restore abuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T03:24:57.793Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699fabd8b7ef31ef0b7dea27

Added to database: 2/26/2026, 2:11:36 AM

Last enriched: 3/5/2026, 10:03:25 AM

Last updated: 4/12/2026, 1:48:47 AM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses